0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (613)
  • R500+ (5,096)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition): C Hadnagy Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition)
C Hadnagy
R813 R691 Discovery Miles 6 910 Save R122 (15%) Ships in 9 - 17 working days

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Mobile Biometrics (Hardcover): Guodong Guo, Harry Wechsler Mobile Biometrics (Hardcover)
Guodong Guo, Harry Wechsler
R3,984 R3,586 Discovery Miles 35 860 Save R398 (10%) Ships in 18 - 22 working days

Mobile biometrics - the use of physical and/or behavioral characteristics of humans to allow their recognition by mobile/smart phones - aims to achieve conventional functionality and robustness while also supporting portability and mobility, bringing greater convenience and opportunity for its deployment in a wide range of operational environments from consumer applications to law enforcement. But achieving these aims brings new challenges such as issues with power consumption, algorithm complexity, device memory limitations, frequent changes in operational environment, security, durability, reliability, and connectivity. Mobile Biometrics provides a timely survey of the state of the art research and developments in this rapidly growing area. Topics covered in Mobile Biometrics include mobile biometric sensor design, deep neural network for mobile person recognition with audio-visual signals, active authentication using facial attributes, fusion of shape and texture features for lip biometry in mobile devices, mobile device usage data as behavioral biometrics, continuous mobile authentication using user phone interaction, smartwatch-based gait biometrics, mobile four-fingers biometrics system, palm print recognition on mobile devices, periocular region for smartphone biometrics, and face anti-spoofing on mobile devices.

Cybertax - Managing the Risks and Results (Paperback): George K. Tsantes, James Ransome Cybertax - Managing the Risks and Results (Paperback)
George K. Tsantes, James Ransome
R575 Discovery Miles 5 750 Ships in 10 - 15 working days

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

Situational Awareness in Computer Network Defense - Principles, Methods and Applications (Hardcover): Cyril Onwubiko, Thomas... Situational Awareness in Computer Network Defense - Principles, Methods and Applications (Hardcover)
Cyril Onwubiko, Thomas Owens
R4,966 Discovery Miles 49 660 Ships in 18 - 22 working days

Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT) that are responsible for ensuring availability, integrity, and confidentiality of network services. Situational Awareness in Computer Network Defense: Principles, Methods and Applications provides academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations for situational awareness in computer networks. This book presents situational awareness solutions in Computer Network Defense (CND) currently being researched or deployed. The key objective is to fill a gap that exists in the way CND and security are being approached by formalizing the use of situational awareness in computer network security and defense.

Secure Data Management for Online Learning Applications (Hardcover): L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo... Secure Data Management for Online Learning Applications (Hardcover)
L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo Pelusi
R3,503 Discovery Miles 35 030 Ships in 10 - 15 working days

Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book

Artificial Intelligence Paradigms for Smart Cyber-Physical Systems (Hardcover): Ashish Kumar Luhach, Atilla Elci Artificial Intelligence Paradigms for Smart Cyber-Physical Systems (Hardcover)
Ashish Kumar Luhach, Atilla Elci
R6,205 Discovery Miles 62 050 Ships in 18 - 22 working days

Cyber-physical systems (CPS) have emerged as a unifying name for systems where cyber parts (i.e., the computing and communication parts) and physical parts are tightly integrated, both in design and during operation. Such systems use computations and communication deeply embedded in and interacting with human physical processes as well as augmenting existing and adding new capabilities. As such, CPS is an integration of computation, networking, and physical processes. Embedded computers and networks monitor and control the physical processes, with feedback loops where physical processes affect computations and vice versa. The economic and societal potential of such systems is vastly greater than what has been realized, and major investments are being made worldwide to develop the technology. Artificial Intelligence Paradigms for Smart Cyber-Physical Systems focuses on the recent advances in Artificial intelligence-based approaches towards affecting secure cyber-physical systems. This book presents investigations on state-of-the-art research issues, applications, and achievements in the field of computational intelligence paradigms for CPS. Covering topics that include autonomous systems, access control, machine learning, and intrusion detection and prevention systems, this book is ideally designed for engineers, industry professionals, practitioners, scientists, managers, students, academicians, and researchers seeking current research on artificial intelligence and cyber-physical systems.

Cryptography (Hardcover): William Buchanan Cryptography (Hardcover)
William Buchanan
R1,988 Discovery Miles 19 880 Ships in 9 - 17 working days

Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including: - full provision of Web-based material on almost every topic covered - provision of additional on-line material, such as videos, source code, and labs - coverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs) Key areas covered include: - Fundamentals of Encryption - Public Key Encryption - Symmetric Key Encryption - Hashing Methods - Key Exchange Methods - Digital Certificates and Authentication - Tunneling - Crypto Cracking - Light-weight Cryptography - Blockchain - Zero-knowledge Proofs This book provides extensive support through the associated website of: http://asecuritysite.com/encryption

The Web Application Hacker's Handbook: Finding and  Exploiting Security Flaws 2e (Paperback, 2nd Edition): D Stuttard The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2e (Paperback, 2nd Edition)
D Stuttard
R1,341 R1,101 Discovery Miles 11 010 Save R240 (18%) Ships in 9 - 17 working days

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. * Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition * Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more * Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws. Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.

String Analysis for Software Verification and Security (Hardcover, 1st ed. 2017): Tevfik Bultan, Muath Alkhalaf, Fang Yu,... String Analysis for Software Verification and Security (Hardcover, 1st ed. 2017)
Tevfik Bultan, Muath Alkhalaf, Fang Yu, Abdulbaki Aydin
R2,427 Discovery Miles 24 270 Ships in 18 - 22 working days

This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.

Security Issues in Mobile NFC Devices (Hardcover, 2015 ed.): Michael Roland Security Issues in Mobile NFC Devices (Hardcover, 2015 ed.)
Michael Roland
R3,298 Discovery Miles 32 980 Ships in 10 - 15 working days

This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

Cyber-Physical Systems and Industry 4.0 - Practical Applications and Security Management (Hardcover): Dinesh Goyal, Shanmugam... Cyber-Physical Systems and Industry 4.0 - Practical Applications and Security Management (Hardcover)
Dinesh Goyal, Shanmugam Balamurugan, Karthikrajan Senthilnathan, Iyswarya Annapoorani, Mohammad Israr
R3,405 Discovery Miles 34 050 Ships in 10 - 15 working days

The book provides a broad outlook on the applications of cyber-physical systems along with case studies and examples in healthcare, automotive electronics, industrial automation, environment monitoring, agriculture, and applications in civil and mechanical sectors. Topics include using an energy management system in smart grids, implementing an intelligent traffic management system, warehouse tracking and monitoring, medical cyber-physical systems security, remote healthcare monitoring, and more.

Research Advances in Intelligent Computing (Hardcover): Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Lalit Garg Research Advances in Intelligent Computing (Hardcover)
Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Lalit Garg
R3,365 Discovery Miles 33 650 Ships in 10 - 15 working days

Since the invention of computers or machines, scientists and researchers are trying very hard to enhance their capabilities to perform various tasks. As a consequence, the capabilities of computers are growing exponentially day by day in terms of diverse working domains, versatile jobs, processing speed, and reduced size. Now, we are in the race to make the computers or machines as intelligent as human beings. Artificial Intelligence (AI) came up as a way of making a computer or computer software think in the similar manner the intelligent humans think. AI is inspired by the study of human brain like how humans think, learn, decide and act while trying to solve a problem. The outcomes of this study are the basis of developing intelligent software and systems or Intelligent Computing (IC). An IC system has the capability of reasoning, learning, problem solving, perception, and linguistic intelligence. The IC systems consist of AI techniques as well as other emerging techniques that make a system intelligent. The use of intelligent computing has been seen in almost every sub-domain of computer science such as networking, software engineering, gaming, natural language processing, computer vision, image processing, data science, robotics, expert systems, and security. Now a days, the use of IC can also be seen for solving various complex problems in diverse domains such as for predicting disease in medical science, predicting land fertility or crop productivity in agriculture science, predicting market growth in economics, weather forecasting and so on. For all these reasons, this book presents the advances in AI techniques, under the umbrella of IC. In this context, the book includes the recent research works have been done in the areas of machine learning, neural networks, deep learning, evolutionary algorithms, genetic algorithms, swarm intelligence, fuzzy systems and so on. This book provides theoretical, algorithmic, simulation, and implementation-based recent research advancements related to the Intelligent Computing.

PKI Implementation and Infrastructures (Hardcover): Julian Ashbourn PKI Implementation and Infrastructures (Hardcover)
Julian Ashbourn
R3,348 Discovery Miles 33 480 Ships in 10 - 15 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

The Economics of Information Security and Privacy (Hardcover, 2013 ed.): Rainer Boehme The Economics of Information Security and Privacy (Hardcover, 2013 ed.)
Rainer Boehme
R3,971 R3,441 Discovery Miles 34 410 Save R530 (13%) Ships in 10 - 15 working days

In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy, and, more recently, cybercrime, all studied from an interdisciplinary angle by combining methods from microeconomics, econometrics, qualitative social sciences, behavioral sciences, and experimental economics.

This book is structured in four parts, reflecting the main areas: management of information security, economics of information security, economics of privacy, and economics of cybercrime. Each individual contribution documents, discusses, and advances the state of the art concerning its specific research questions. It will be of value to academics and practitioners in the related fields.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Hardcover): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Hardcover)
Alan Tang
R3,119 Discovery Miles 31 190 Ships in 10 - 15 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Networking, Intelligent Systems and Security - Proceedings of NISS 2021 (Hardcover, 1st ed. 2022): Mohamed Ben Ahmed,... Networking, Intelligent Systems and Security - Proceedings of NISS 2021 (Hardcover, 1st ed. 2022)
Mohamed Ben Ahmed, Horia-Nicolai L. Teodorescu, Tomader Mazri, Parthasarathy Subashini, Anouar Abdelhakim Boudhir
R6,698 Discovery Miles 66 980 Ships in 18 - 22 working days

This book gathers best selected research papers presented at the International Conference on Networking, Intelligent Systems and Security, held in Kenitra, Morocco, during 01-02 April 2021. The book highlights latest research and findings in the field of ICT, and it provides new solutions, efficient tools, and techniques that draw on modern technologies to increase urban services. In addition, it provides a critical overview of the status quo, shares new propositions, and outlines future perspectives in networks, smart systems, security, information technologies, and computer science.

Innovation in Crisis Management (Paperback): Chiara Fonio, Adam Widera, Tomasz Zweglinski Innovation in Crisis Management (Paperback)
Chiara Fonio, Adam Widera, Tomasz Zweglinski
R1,229 Discovery Miles 12 290 Ships in 10 - 15 working days

This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries. The aim of this book is to tackle innovation in crisis management through lessons learnt and experiences gained from the implementation of mixed methods through a practitioner-driven approach in a large-scale demonstration project (DRIVER+). It explores innovation from the perspective of the end-users by focusing on the needs and problems they are trying to address through a tool (be it an app, a drone, or a training program) and takes a deep dive into what is needed to understand if and to what extent the tool they have in mind can really bring innovation. This book is a toolkit for readers interested in understanding what needs to be in place to measure innovation: it provides the know-how through examples and best practices. The book will be a valuable source of knowledge for scientists, practitioners, researchers, and postgraduate students studying safety, crisis management, and innovation.

Innovation in Crisis Management (Hardcover): Chiara Fonio, Adam Widera, Tomasz Zweglinski Innovation in Crisis Management (Hardcover)
Chiara Fonio, Adam Widera, Tomasz Zweglinski
R4,091 Discovery Miles 40 910 Ships in 10 - 15 working days

This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries. The aim of this book is to tackle innovation in crisis management through lessons learnt and experiences gained from the implementation of mixed methods through a practitioner-driven approach in a large-scale demonstration project (DRIVER+). It explores innovation from the perspective of the end-users by focusing on the needs and problems they are trying to address through a tool (be it an app, a drone, or a training program) and takes a deep dive into what is needed to understand if and to what extent the tool they have in mind can really bring innovation. This book is a toolkit for readers interested in understanding what needs to be in place to measure innovation: it provides the know-how through examples and best practices. The book will be a valuable source of knowledge for scientists, practitioners, researchers, and postgraduate students studying safety, crisis management, and innovation.

Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Hardcover): Andrew Jenkinson Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Hardcover)
Andrew Jenkinson
R3,365 Discovery Miles 33 650 Ships in 10 - 15 working days

- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.

Innovations in Cybersecurity Education (Hardcover, 1st ed. 2020): Kevin Daimi, Guillermo Francia III Innovations in Cybersecurity Education (Hardcover, 1st ed. 2020)
Kevin Daimi, Guillermo Francia III
R3,842 Discovery Miles 38 420 Ships in 18 - 22 working days

This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists.

Modern Industrial IoT, Big Data and Supply Chain - Proceedings of the IIoTBDSC 2020 (Hardcover, 1st ed. 2021): Victor Chang,... Modern Industrial IoT, Big Data and Supply Chain - Proceedings of the IIoTBDSC 2020 (Hardcover, 1st ed. 2021)
Victor Chang, Muthu Ramachandran, Victor Mendez Munoz
R6,578 Discovery Miles 65 780 Ships in 18 - 22 working days

This book is a collection of selected papers presented at the First International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC), held as an online conference due to COVID-19 (initially to be held in Macao, Special Administration Region (SAR) of China), during September 15-17, 2020. It includes novel and innovative work from experts, practitioners, scientists and decision-makers from academia and industry. It brings multi-disciplines together on IIoT, data science, cloud computing, software engineering approaches to design, development, testing and quality of products and services.

Physical Security: 150 Things You Should Know (Paperback, 2nd edition): Lawrence Fennelly, Marianna Perry Physical Security: 150 Things You Should Know (Paperback, 2nd edition)
Lawrence Fennelly, Marianna Perry
R1,566 Discovery Miles 15 660 Ships in 10 - 15 working days

Physical Security: 150 Things You Should Know, Second Edition is a useful reference for those at any stage of their security career. This practical guide covers the latest technological trends for managing the physical security needs of buildings and campuses of all sizes. Through anecdotes, case studies, and documented procedures, the authors have amassed the most complete collection of information on physical security available. Security practitioners of all levels will find this book easy to use as they look for practical tips to understand and manage the latest physical security technologies, such as biometrics, IP video, video analytics, and mass notification, as well as the latest principles in access control, command and control, perimeter protection, and visitor management.

Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Paperback): Kevin E. Foltz,... Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Paperback)
Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses
R1,371 Discovery Miles 13 710 Ships in 9 - 17 working days

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.

CBAP (R) Certification and BABOK (R) Study Guide (Paperback): Hans Jonasson CBAP (R) Certification and BABOK (R) Study Guide (Paperback)
Hans Jonasson
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

The book covers all knowledge areas from the BABOK (R), Third Edition, and is designed to be a study guide for the CBAP (R) certification from IIBA (TM). It includes over 300 sample questions. It is also usable for those seeking the PMI-PBA (R) certification. This book is a complete business analysis handbook combining the latest standards from the BABOK (R) case study examples and exercises with solutions. It has usable tools and techniques, as well as templates ready to be used to develop solid requirements to be the cornerstone for any successful product development.

Information Centric Networks (ICN) - Architecture & Current Trends (Hardcover, 1st ed. 2021): Nitul Dutta, Hiren Kumar Deva... Information Centric Networks (ICN) - Architecture & Current Trends (Hardcover, 1st ed. 2021)
Nitul Dutta, Hiren Kumar Deva Sarma, Rajendrasinh Jadeja, Krishna Delvadia, Gheorghita Ghinea
R4,695 Discovery Miles 46 950 Ships in 18 - 22 working days

This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, … Hardcover R3,116 Discovery Miles 31 160
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R7,962 Discovery Miles 79 620
Managing Resources for Futuristic…
Tariq Umer Hardcover R5,327 Discovery Miles 53 270
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,333 Discovery Miles 53 330
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300

 

Partners